| 
 | 1 | +---  | 
 | 2 | +title: Command Injection Vulnerability  | 
 | 3 | +description: "How to mitigate CVE-2024-7679, a command injection vulnerability when using hyperlinks."  | 
 | 4 | +slug: command-injection-vulnerability-cve-2024-7679  | 
 | 5 | +res_type: kb  | 
 | 6 | +---  | 
 | 7 | + | 
 | 8 | +## Description  | 
 | 9 | + | 
 | 10 | +Product Alert – September 2024 - [CVE-2024-7679](https://www.cve.org/CVERecord?id=CVE-2024-7679)  | 
 | 11 | + | 
 | 12 | +- Telerik UI for WinForms 2024 Q3 (2024.3.806) or earlier.  | 
 | 13 | + | 
 | 14 | +## Issue  | 
 | 15 | + | 
 | 16 | +CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')  | 
 | 17 | + | 
 | 18 | +### What Are the Impacts  | 
 | 19 | + | 
 | 20 | +In Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements.  | 
 | 21 | + | 
 | 22 | +## Solution  | 
 | 23 | + | 
 | 24 | +We have addressed the issue and the Progress Telerik team recommends performing an upgrade to the version listed in the table below.  | 
 | 25 | + | 
 | 26 | +| Current Version | Guidance |  | 
 | 27 | +|-----------------|----------|  | 
 | 28 | +| 2024 Q3 (2024.3.806) or earlier | Update to 2024 Q3 (2024.3.924) ([update instructions](({%slug how-to-upgrade-a-project%}))) |  | 
 | 29 | + | 
 | 30 | +All customers who have a Telerik UI for WinForms license can access the downloads here [Product Downloads | Your Account](https://www.telerik.com/account/downloads/product-download?product=RCWPF).  | 
 | 31 | + | 
 | 32 | +## Notes  | 
 | 33 | + | 
 | 34 | +- If a RichTextBox, PdfViewer, or Spreadsheet is not used in the project, the application is not affected by this issue.  | 
 | 35 | +- To check your version of Telerik UI for WinForms  | 
 | 36 | +  - Via source code: Inspect the Version property of any of the Telerik.WinControls.* assembly references in the project.  | 
 | 37 | +  - Via deployed application: Locate any Telerik.WinControls.* DLL file in the application's directory and view the Properties > Details > Version.  | 
 | 38 | +- If you have any questions or concerns related to this issue, open a new Technical Support case in [Your Account | Support Center](https://www.telerik.com/account/support-center/contact-us/). Technical Support is available to Telerik customers with an active support plan.  | 
 | 39 | + | 
 | 40 | +## External References  | 
 | 41 | + | 
 | 42 | +[CVE-2024-7679](https://www.cve.org/CVERecord?id=CVE-2024-7679) (HIGH)  | 
 | 43 | + | 
 | 44 | +**CVSS:** 7.8  | 
 | 45 | + | 
 | 46 | +In Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements.  | 
0 commit comments